CN106295266A - Data inputting method and device - Google Patents

Data inputting method and device Download PDF

Info

Publication number
CN106295266A
CN106295266A CN201510282846.3A CN201510282846A CN106295266A CN 106295266 A CN106295266 A CN 106295266A CN 201510282846 A CN201510282846 A CN 201510282846A CN 106295266 A CN106295266 A CN 106295266A
Authority
CN
China
Prior art keywords
information
verified
input
item
stored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510282846.3A
Other languages
Chinese (zh)
Inventor
何勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510282846.3A priority Critical patent/CN106295266A/en
Priority to PCT/CN2016/080440 priority patent/WO2016188297A1/en
Priority to KR1020177037744A priority patent/KR102348769B1/en
Priority to PL16799186T priority patent/PL3306505T3/en
Priority to SG11201709536RA priority patent/SG11201709536RA/en
Priority to EP16799186.8A priority patent/EP3306505B1/en
Priority to ES16799186T priority patent/ES2806629T3/en
Priority to JP2017561926A priority patent/JP2018517211A/en
Publication of CN106295266A publication Critical patent/CN106295266A/en
Priority to US15/822,438 priority patent/US10970482B2/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/232Orthographic correction, e.g. spell checking or vowelisation
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04886Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures by partitioning the display area of the touch-screen or the surface of the digitising tablet into independently controllable areas, e.g. virtual keyboards or menus
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/279Recognition of textual entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/031Protect user input by software means
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Artificial Intelligence (AREA)
  • Computational Linguistics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Power Engineering (AREA)
  • Signal Processing (AREA)
  • Human Computer Interaction (AREA)
  • Input From Keyboards Or The Like (AREA)
  • Document Processing Apparatus (AREA)
  • User Interface Of Digital Computer (AREA)
  • Telephone Function (AREA)

Abstract

本申请提出一种信息输入方法和装置,该信息输入方法包括获取预先保存的信息,所述预先保存的信息包括:明文的第一信息,或者,加密后的第一信息,所述第一信息包括:设置的信息,以及,根据所述设置的信息生成的关联信息;接收待验证的信息;根据所述预先保存的信息,对所述待验证的信息进行验证;如果所述待验证的信息属于所述关联信息,进行再次验证,该方法能够有效区分无意错误与恶意错误,降低由于无意输入错误造成的信息验证失败。

This application proposes an information input method and device. The information input method includes obtaining pre-stored information, and the pre-stored information includes: first information in plain text, or encrypted first information, the first information Including: set information, and associated information generated according to the set information; receiving information to be verified; verifying the information to be verified according to the pre-saved information; if the information to be verified Belonging to the associated information, the verification is performed again. This method can effectively distinguish between unintentional errors and malicious errors, and reduce information verification failures caused by unintentional input errors.

Description

Information input method and device
Technical Field
The present application relates to the field of data processing technologies, and in particular, to an information input method and apparatus.
Background
With the development of mobile communication technology, users may often need to enter information on mobile devices. Especially, when information is input on a mobile phone, the size of the mobile phone is limited, the physical keyboard or the virtual keyboard is small, and a user can easily input wrong information, for example, a letter a is input originally but a letter such as s near the letter a is input actually.
Disclosure of Invention
The present application is directed to solving, at least to some extent, one of the technical problems in the related art.
Therefore, an object of the present invention is to provide an information input method, which can reduce input errors caused by a small keyboard and improve input effects.
Another object of the present application is to provide an information input device.
In order to achieve the above object, an information input method provided in an embodiment of a first aspect of the present application includes: obtaining pre-saved information, wherein the pre-saved information comprises: plaintext first information, or encrypted first information, the first information comprising: the method comprises the steps of setting information and generating associated information according to the set information; receiving information to be verified; verifying the information to be verified according to the pre-stored information; and if the information to be verified belongs to the associated information, receiving the information to be verified which is input again.
The information input method provided by the embodiment of the first aspect of the application can generate not only the set information, but also the associated information obtained according to the set information, and receive the re-input information to be verified when the information to be verified belongs to the associated information, so that the user has a chance of re-verification after an input error caused by a small keyboard and the like, the input error caused by the small keyboard is reduced, and the input effect is improved.
In order to achieve the above object, an embodiment of a second aspect of the present application provides an information input device, including: an obtaining module, configured to obtain pre-stored information, where the pre-stored information includes: plaintext first information, or encrypted first information, the first information comprising: the method comprises the steps of setting information and generating associated information according to the set information; the first receiving module is used for receiving information to be verified; the verification module is used for verifying the information to be verified according to the pre-stored information; and the second receiving module is used for receiving the re-input information to be verified if the information to be verified belongs to the associated information.
The information input device provided by the embodiment of the second aspect of the present application may generate not only the set information, but also the associated information obtained according to the set information, and receive the re-input information to be verified when the information to be verified belongs to the associated information, so that there is a chance of re-verification after an input error caused by a user due to a small keyboard or the like, thereby reducing an input error caused by the small keyboard, and improving an input effect.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
The foregoing and/or additional aspects and advantages of the present application will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flowchart of an information input method according to an embodiment of the present application;
FIG. 2 is a schematic flow chart of an information input method according to another embodiment of the present application;
FIG. 3 is a schematic flow chart of an information input method according to another embodiment of the present application;
FIG. 4 is a schematic flow chart of an information input method according to another embodiment of the present application;
fig. 5 is a schematic structural diagram of an information input device according to another embodiment of the present application;
fig. 6 is a schematic structural diagram of an information input device according to another embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar modules or modules having the same or similar functionality throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present application. On the contrary, the embodiments of the application include all changes, modifications and equivalents coming within the spirit and terms of the claims appended hereto.
Fig. 1 is a schematic flowchart of an information input method according to an embodiment of the present application, where the method includes:
s11: obtaining pre-saved information, wherein the pre-saved information comprises: plaintext first information, or encrypted first information, the first information comprising: the information of the setting, and the associated information generated according to the information of the setting.
The method of the embodiment can be used for information verification in various scenes, for example, for password verification, identity card number verification, bank card number verification, mobile phone number verification and the like.
Before password authentication, the user may set a password in advance, for example, the set password is x. It is understood that the password x set by the user may include one or more information items, each of which may be a number or a letter, etc.
Further, taking the case that the password is stored at the mobile phone end as an example, the password can be stored in the clear text when being stored at the mobile phone end, for example, directly stored as x. Or, to improve security, the plaintext password is encrypted and stored, for example, the mobile phone stores the encrypted x. It will be appreciated that there are a variety of encryption algorithms, for example, hash algorithms in particular. In this embodiment, the mobile phone side stores the hashed and encrypted password as an example. Let x be denoted as H (x) after being hashed.
In the prior art, the prestored information is at most H (x), and when the user inputs x, the verification fails.
In this embodiment, not only h (x) but also the associated information can be obtained according to x, and the information obtained by performing hash encryption on the associated information is also stored at the mobile phone.
Specifically, referring to fig. 2, the method of this embodiment may further include:
s10: and generating associated information according to the set information.
Optionally, the generating the associated information according to the set information includes:
randomly selecting one information item in the set information, and acquiring a new information item corresponding to the selected information item, wherein the position distance between the new information item and the selected information item on the keyboard is within a preset range;
and replacing the selected information item in the set information with the new information item to obtain the associated information.
For example, if one of the passwords x set by the user is a, corresponding to a, a character which is closer to a on the virtual keyboard or the physical keyboard may be selected as a new character, assuming that the new character is represented by a ', a ' is substituted for a to form a new password x ', which is the associated information of x, and after hash encryption is performed, the encrypted associated information may be represented as: h (x '), H (x "), …, the sequence being denoted as H'. Specifically, if x is abcd, and the character closer to a includes a ', the associated information of x includes a' bcd, and if the character closer to a also includes a ″, the associated information of x further includes: a "bcd," and assuming that the character closer to b includes b', the association information of x further includes: ab' cd, and so on, all the associated information can be obtained.
It is understood that the specific meaning of the close distance may be set according to actual needs, for example, characters corresponding to adjacent keys around may be determined as characters with the close distance, or characters within two keys apart may be determined as characters with the close distance, and the like.
S12: information to be verified is received.
Wherein, the user can input the information to be verified through the keyboard of the keyboard.
For example, the user inputs a password or the like using a virtual keyboard of a cellular phone.
S13: and verifying the information to be verified according to the pre-stored information.
When the mobile phone end directly stores the password of the plaintext, the input information and the pre-stored information can be directly compared, when the input information and the pre-stored information are the same, the verification is passed, otherwise, the verification is not passed.
The embodiment takes the case of storing the encrypted first information as an example.
When the pre-stored information is encrypted first information, the verifying the information to be verified according to the pre-stored information includes:
encrypting the information to be verified by adopting an encryption algorithm the same as that of the first information to obtain the encrypted information to be verified;
and comparing the encrypted information to be verified with the information stored in advance.
Assuming that the information to be verified input by the user is y, and assuming that a hash encryption algorithm is adopted, H (y) may be calculated first, and then H (y) may be compared with H (x) and H'.
S14: and if the information to be verified belongs to the associated information, receiving the information to be verified which is input again.
For example, if H (y) belongs to H', the re-entered information to be verified may be received. After which a further verification can be performed.
Referring to fig. 3, in this embodiment, when the information to be verified belongs to the associated information, the following steps may be specifically performed:
s141: and receiving the information to be verified input again, and guiding or giving an obvious prompt.
Specifically, the guiding or giving an obvious prompt may include:
before receiving information to be verified input again, displaying prompt information to a user, wherein the prompt information is used for prompting the user to pay attention to the keyboard keys; or,
after receiving the re-input information to be verified, prolonging the plaintext display time of the re-input information to be verified; or,
and after receiving the re-input information to be verified, directly displaying the re-input information to be verified in a plaintext form.
For example, when y input by the user belongs to the associated information, which is probably because the key pressing is small, the user can be reminded to pay attention to the keyboard to avoid inputting errors due to the small keyboard. Or,
usually, all information that is finally displayed in the password authentication is non-plaintext, for example, a symbol is displayed, and information input by a user in plaintext is displayed shortly before the symbol is displayed.
In this embodiment, when the plaintext display time is prolonged, the plaintext display time of each item of information in the information to be verified may be prolonged, or only the plaintext display time of the information item input with the error last time may be prolonged. For example, if the information to be verified is abcd, if a is detected to have an error for the first time, only the plaintext display time of a may be extended, or the plaintext display times of a, b, c, and d may be extended. In addition, similar execution can be performed in the plaintext display, such as displaying only the information item input with the error last time in the plaintext, or displaying all the information items in the plaintext.
And then further performing:
s142: a re-authentication is performed.
For example, the user may check the re-input information to be verified according to the prompt information or the information displayed in the plaintext, and after receiving the re-input information to be verified, the mobile phone terminal may compare the re-input information to be verified with the pre-stored information to obtain a verification result.
In this embodiment, the time for displaying the plaintext input information may be extended, so that the user may better see the information input by himself to verify whether the input is correct, and the specific extended time may be set. Or, the display is directly in a clear text form, so that the user can conveniently check the display.
On the other hand, referring to fig. 4, after the user verifies the input information to be verified, the method may further include:
s15: and if the information to be verified is the same as the set information, determining that the verification is passed.
For example, when the stored value is a hashed value, if the information to be verified input by the user is y, the hash operation is performed on y to obtain h (y), and if h (y) is the same as h (x), the verification is passed.
S16: and if the information to be verified is different from the set information and does not belong to the associated information, determining that the information does not pass verification.
For example, if H (y) is different from H (x) and H (y) does not belong to H', it is determined that the password is not verified, and at this time, the user is presented with a message that the password input is incorrect.
In the embodiment, not only the set information but also the associated information obtained according to the set information can be generated, and when the information to be verified belongs to the associated information, the information is verified again, so that the user has the chance of verifying again after an input error caused by a small keyboard and the like, the input error caused by the small keyboard is reduced, and the input effect is improved. The method is different from the direct verification failure of the malicious input error, so that the unintentional error and the malicious error can be effectively distinguished, and the information verification failure caused by the unintentional input error is reduced.
Fig. 5 is a schematic structural diagram of an information input device according to another embodiment of the present application, where the device 50 includes: an acquisition module 51, a first receiving module 52, a verification module 53 and a second receiving module 54.
An obtaining module 51, configured to obtain pre-stored information, where the pre-stored information includes: plaintext first information, or encrypted first information, the first information comprising: the method comprises the steps of setting information and generating associated information according to the set information;
the method of the embodiment can be used for information verification in various scenes, for example, for password verification, identity card number verification, bank card number verification, mobile phone number verification and the like.
Before password authentication, the user may set a password in advance, for example, the set password is x. It is understood that the password x set by the user may include one or more information items, each of which may be a number or a letter, etc.
Further, taking the case that the password is stored at the mobile phone end as an example, the password can be stored in the clear text when being stored at the mobile phone end, for example, directly stored as x. Or, to improve security, the plaintext password is encrypted and stored, for example, the mobile phone stores the encrypted x. It will be appreciated that there are a variety of encryption algorithms, for example, hash algorithms in particular. In this embodiment, the mobile phone side stores the hashed and encrypted password as an example. Let x be denoted as H (x) after being hashed.
In the prior art, the prestored information is at most H (x), and when the user inputs x, the verification fails.
In this embodiment, not only h (x) but also the associated information can be obtained according to x, and the information obtained by performing hash encryption on the associated information is also stored at the mobile phone.
Referring to fig. 6, the apparatus 50 further comprises:
a setting module 55, configured to arbitrarily select an information item from the set information, and acquire a new information item corresponding to the selected information item, where a distance between positions of the new information item and the selected information item on the keyboard is within a preset range; and replacing the selected information item in the set information with the new information item to obtain the associated information.
For example, if one of the passwords x set by the user is a, corresponding to a, a character which is closer to a on the virtual keyboard or the physical keyboard may be selected as a new character, assuming that the new character is represented by a ', a ' is substituted for a to form a new password x ', which is the associated information of x, and after hash encryption is performed, the encrypted associated information may be represented as: h (x '), H (x "), …, the sequence being denoted as H'. Specifically, if x is abcd, and the character closer to a includes a ', the associated information of x includes a' bcd, and if the character closer to a also includes a ″, the associated information of x further includes: a "bcd," and assuming that the character closer to b includes b', the association information of x further includes: ab' cd, and so on, all the associated information can be obtained.
It is understood that the specific meaning of the close distance may be set according to actual needs, for example, characters corresponding to adjacent keys around may be determined as characters with the close distance, or characters within two keys apart may be determined as characters with the close distance, and the like.
A first receiving module 52, configured to receive information to be verified;
wherein, the user can input the information to be verified through the keyboard of the keyboard.
For example, the user inputs a password or the like using a virtual keyboard of a cellular phone.
The verification module 53 is configured to verify the information to be verified according to the pre-stored information;
when the mobile phone end directly stores the password of the plaintext, the input information and the pre-stored information can be directly compared, when the input information and the pre-stored information are the same, the verification is passed, otherwise, the verification is not passed.
The embodiment takes the case of storing the encrypted first information as an example.
When the pre-stored information is encrypted first information, the verification module 53 is specifically configured to:
encrypting the information to be verified by adopting an encryption algorithm the same as that of the first information to obtain the encrypted information to be verified;
and comparing the encrypted information to be verified with the information stored in advance.
Assuming that the information to be verified input by the user is y, and assuming that a hash encryption algorithm is adopted, H (y) may be calculated first, and then H (y) may be compared with H (x) and H'.
A second receiving module 54, configured to receive the re-input information to be verified if the information to be verified belongs to the associated information.
For example, if H (y) belongs to H', the re-entered information to be verified may be received. After which a further verification can be performed.
Optionally, the second receiving module is further configured to:
before receiving information to be verified input again, displaying prompt information to a user, wherein the prompt information is used for prompting the user to pay attention to the keyboard keys; or,
after receiving the re-input information to be verified, prolonging the plaintext display time of the re-input information to be verified; or,
and after receiving the re-input information to be verified, directly displaying the re-input information to be verified in a plaintext form.
For example, when y input by the user belongs to the associated information, which is probably because the key pressing is small, the user can be reminded to pay attention to the keyboard to avoid inputting errors due to the small keyboard. Or,
usually, all information that is finally displayed in the password authentication is non-plaintext, for example, a symbol is displayed, and information input by a user in plaintext is displayed shortly before the symbol is displayed.
In this embodiment, when the plaintext display time is prolonged, the plaintext display time of each item of information in the information to be verified may be prolonged, or only the plaintext display time of the information item input with the error last time may be prolonged. For example, if the information to be verified is abcd, if a is detected to have an error for the first time, only the plaintext display time of a may be extended, or the plaintext display times of a, b, c, and d may be extended. In addition, similar execution can be performed in the plaintext display, such as displaying only the information item input with the error last time in the plaintext, or displaying all the information items in the plaintext.
In this embodiment, the time for displaying the plaintext input information may be extended, so that the user may better see the information input by himself to verify whether the input is correct, and the specific extended time may be set. Or, the display is directly in a clear text form, so that the user can conveniently check the display.
Referring to fig. 6, the apparatus 50 further comprises:
a determining module 56, configured to determine that the verification is passed if the information to be verified is the same as the set information; or if the information to be verified is different from the set information and does not belong to the associated information, determining that the verification is not passed.
For example, when the stored value is a hashed value, if the information to be verified input by the user is y, the hash operation is performed on y to obtain h (y), and if h (y) is the same as h (x), the verification is passed.
For example, if H (y) is different from H (x) and H (y) does not belong to H', it is determined that the password is not verified, and at this time, the user is presented with a message that the password input is incorrect.
In the embodiment, not only the set information but also the associated information obtained according to the set information can be generated, and when the information to be verified belongs to the associated information, the information is verified again, so that the user has the chance of verifying again after an input error caused by a small keyboard and the like, the input error caused by the small keyboard is reduced, and the input effect is improved. The method is different from the direct verification failure of the malicious input error, so that the unintentional error and the malicious error can be effectively distinguished, and the information verification failure caused by the unintentional input error is reduced.
It should be noted that, in the description of the present application, the terms "first", "second", etc. are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. Further, in the description of the present application, the meaning of "a plurality" means at least two unless otherwise specified.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present application may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium.
The storage medium mentioned above may be a read-only memory, a magnetic or optical disk, etc.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
Although embodiments of the present application have been shown and described above, it is understood that the above embodiments are exemplary and should not be construed as limiting the present application, and that variations, modifications, substitutions and alterations may be made to the above embodiments by those of ordinary skill in the art within the scope of the present application.

Claims (11)

1.一种信息输入方法,其特征在于,包括:1. An information input method, characterized in that, comprising: 获取预先保存的信息,所述预先保存的信息包括:明文的第一信息,或者,加密后的第一信息,所述第一信息包括:设置的信息,以及,根据所述设置的信息生成的关联信息;Acquiring pre-stored information, the pre-stored information includes: first information in plain text, or encrypted first information, where the first information includes: set information, and, generated according to the set information related information; 接收待验证的信息;receive information to be verified; 根据所述预先保存的信息,对所述待验证的信息进行验证;Verifying the information to be verified according to the pre-saved information; 如果所述待验证的信息属于所述关联信息,接收再次输入的待验证的信息。If the information to be verified belongs to the associated information, the re-input information to be verified is received. 2.根据权利要求1所述的方法,其特征在于,还包括:2. The method according to claim 1, further comprising: 在接收再次输入的待验证的信息之前,向用户展示提示信息,所述提示信息用于提示用户注意键盘按键;或者,Before receiving the information to be verified again, display prompt information to the user, where the prompt information is used to remind the user to pay attention to the keyboard keys; or, 在接收再次输入的待验证的信息之后,延长再次输入的待验证的信息的明文显示时间;或者,After receiving the re-entered information to be verified, prolong the display time of the re-entered information to be verified in plain text; or, 在接收再次输入的待验证的信息之后,直接以明文形式显示再次输入的待验证的信息。After receiving the re-input information to be verified, the re-input information to be verified is directly displayed in plain text. 3.根据权利要求1所述的方法,其特征在于,还包括:根据所述设置的信息生成关联信息,所述根据所述设置的信息生成关联信息,包括:3. The method according to claim 1, further comprising: generating associated information according to the set information, said generating associated information according to the set information, comprising: 在所述设置的信息中任意选择一个信息项,获取与选择的信息项对应的新的信息项,其中,所述新的信息项与所述选择的信息项在键盘上的位置距离处于预设范围内;Randomly select an information item in the set information, and obtain a new information item corresponding to the selected information item, wherein the position distance between the new information item and the selected information item on the keyboard is at a preset distance within the scope; 用所述新的信息项替代所述设置的信息中的所述选择的信息项,得到所述关联信息。The associated information is obtained by replacing the selected information item in the set information with the new information item. 4.根据权利要求1所述的方法,其特征在于,当所述预先保存的信息是加密后的第一信息时,所述根据所述预先保存的信息,对所述待验证的信息进行验证,包括:4. The method according to claim 1, wherein when the pre-stored information is encrypted first information, the information to be verified is verified according to the pre-stored information ,include: 采用与所述第一信息相同的加密算法,对所述待验证的信息进行加密,得到加密后的待验证的信息;Encrypting the information to be verified by using the same encryption algorithm as that of the first information to obtain the encrypted information to be verified; 比较所述加密后的待验证的信息以及预先保存的信息。The encrypted information to be verified is compared with the pre-stored information. 5.根据权利要求4所述的方法,其特征在于,所述加密算法是哈希算法。5. The method according to claim 4, wherein the encryption algorithm is a hash algorithm. 6.根据权利要求1-5任一项所述的方法,其特征在于,所述根据所述预先保存的信息,对所述待验证的信息进行验证之后,所述方法还包括:6. The method according to any one of claims 1-5, characterized in that, after verifying the information to be verified according to the pre-saved information, the method further comprises: 如果所述待验证的信息与所述设置的信息相同,则确定通过验证;或者,If the information to be verified is the same as the set information, it is determined that the verification is passed; or, 如果所述待验证的信息与所述设置的信息不同,且不属于所述关联信息,则确定不通过验证。If the information to be verified is different from the set information and does not belong to the associated information, it is determined that the verification is not passed. 7.一种信息输入装置,其特征在于,包括:7. An information input device, characterized in that it comprises: 获取模块,用于获取预先保存的信息,所述预先保存的信息包括:明文的第一信息,或者,加密后的第一信息,所述第一信息包括:设置的信息,以及,根据所述设置的信息生成的关联信息;An acquisition module, configured to acquire pre-stored information, where the pre-stored information includes: first information in plain text, or encrypted first information, where the first information includes: set information, and, according to the Associated information generated by the set information; 第一接收模块,用于接收待验证的信息;A first receiving module, configured to receive information to be verified; 验证模块,用于根据所述预先保存的信息,对所述待验证的信息进行验证;A verification module, configured to verify the information to be verified according to the pre-stored information; 第二接收模块,用于如果所述待验证的信息属于所述关联信息,接收再次输入的待验证的信息。The second receiving module is configured to receive the re-input information to be verified if the information to be verified belongs to the associated information. 8.根据权利要求7所述的装置,其特征在于,所述第二接收模块还用于:8. The device according to claim 7, wherein the second receiving module is also used for: 在接收再次输入的待验证的信息之前,向用户展示提示信息,所述提示信息用于提示用户注意键盘按键;或者,Before receiving the information to be verified again, display prompt information to the user, where the prompt information is used to remind the user to pay attention to the keyboard keys; or, 在接收再次输入的待验证的信息之后,延长再次输入的待验证的信息的明文显示时间;或者,After receiving the re-entered information to be verified, prolong the display time of the re-entered information to be verified in plain text; or, 在接收再次输入的待验证的信息之后,直接以明文形式显示再次输入的待验证的信息。After receiving the re-input information to be verified, the re-input information to be verified is directly displayed in plain text. 9.根据权利要求7所述的装置,其特征在于,还包括:9. The device according to claim 7, further comprising: 设置模块,用于在所述设置的信息中任意选择一个信息项,获取与选择的信息项对应的新的信息项,其中,所述新的信息项与所述选择的信息项在键盘上的位置距离处于预设范围内;用所述新的信息项替代所述设置的信息中的所述选择的信息项,得到所述关联信息。A setting module, configured to arbitrarily select an information item in the set information, and obtain a new information item corresponding to the selected information item, wherein, the new information item is the same as the selected information item on the keyboard The location distance is within a preset range; and the new information item is used to replace the selected information item in the set information to obtain the associated information. 10.根据权利要求7所述的装置,其特征在于,当所述预先保存的信息是加密后的第一信息时,所述验证模块具体用于:10. The device according to claim 7, wherein when the pre-stored information is encrypted first information, the verification module is specifically configured to: 采用与所述第一信息相同的加密算法,对所述待验证的信息进行加密,得到加密后的待验证的信息;Encrypting the information to be verified by using the same encryption algorithm as that of the first information to obtain the encrypted information to be verified; 比较所述加密后的待验证的信息以及预先保存的信息。The encrypted information to be verified is compared with the pre-stored information. 11.根据权利要求7-10任一项所述的装置,其特征在于,还包括:11. The device according to any one of claims 7-10, further comprising: 确定模块,用于如果所述待验证的信息与所述设置的信息相同,则确定通过验证;或者,如果所述待验证的信息与所述设置的信息不同,且不属于所述关联信息,则确定不通过验证。A determining module, configured to determine that the verification is passed if the information to be verified is the same as the set information; or, if the information to be verified is different from the set information and does not belong to the associated information, Then it is determined that the verification is not passed.
CN201510282846.3A 2015-05-28 2015-05-28 Data inputting method and device Pending CN106295266A (en)

Priority Applications (9)

Application Number Priority Date Filing Date Title
CN201510282846.3A CN106295266A (en) 2015-05-28 2015-05-28 Data inputting method and device
PCT/CN2016/080440 WO2016188297A1 (en) 2015-05-28 2016-04-28 Information input method and device
KR1020177037744A KR102348769B1 (en) 2015-05-28 2016-04-28 Information input methods and devices
PL16799186T PL3306505T3 (en) 2015-05-28 2016-04-28 Information input method and device
SG11201709536RA SG11201709536RA (en) 2015-05-28 2016-04-28 Information input method and apparatus
EP16799186.8A EP3306505B1 (en) 2015-05-28 2016-04-28 Information input method and device
ES16799186T ES2806629T3 (en) 2015-05-28 2016-04-28 Information input method and device
JP2017561926A JP2018517211A (en) 2015-05-28 2016-04-28 Information input method and apparatus
US15/822,438 US10970482B2 (en) 2015-05-28 2017-11-27 Assisted data input

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510282846.3A CN106295266A (en) 2015-05-28 2015-05-28 Data inputting method and device

Publications (1)

Publication Number Publication Date
CN106295266A true CN106295266A (en) 2017-01-04

Family

ID=57393772

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510282846.3A Pending CN106295266A (en) 2015-05-28 2015-05-28 Data inputting method and device

Country Status (9)

Country Link
US (1) US10970482B2 (en)
EP (1) EP3306505B1 (en)
JP (1) JP2018517211A (en)
KR (1) KR102348769B1 (en)
CN (1) CN106295266A (en)
ES (1) ES2806629T3 (en)
PL (1) PL3306505T3 (en)
SG (1) SG11201709536RA (en)
WO (1) WO2016188297A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106708282B (en) * 2015-12-02 2019-03-19 北京搜狗科技发展有限公司 A kind of recommended method and device, a kind of device for recommendation
US12476822B2 (en) 2023-06-01 2025-11-18 Lawrence Livermore National Security, Llc Differentiation between human-generated and AI-generated text

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103455165A (en) * 2012-05-31 2013-12-18 捷讯研究有限公司 Touchscreen keyboard with corrective word prediction
CN103699233A (en) * 2013-12-20 2014-04-02 百度在线网络技术(北京)有限公司 Character string input method and device
CN104331668A (en) * 2014-09-28 2015-02-04 小米科技有限责任公司 Wrong password prompting method and device
CN104375665A (en) * 2014-12-09 2015-02-25 三星电子(中国)研发中心 Input-method error correction method and input-method error correction device

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5682475A (en) * 1994-12-30 1997-10-28 International Business Machines Corporation Method and system for variable password access
JP3217032B2 (en) * 1998-06-25 2001-10-09 インターナショナル・ビジネス・マシーンズ・コーポレーション Password authentication device and method
JP4519381B2 (en) 1999-05-27 2010-08-04 テジック コミュニケーションズ インク Keyboard system with automatic correction
US7030863B2 (en) 2000-05-26 2006-04-18 America Online, Incorporated Virtual keyboard system with automatic correction
US7114077B2 (en) * 2000-08-23 2006-09-26 Ryan Miller Verification system for confidential data input
FR2818408B1 (en) 2000-12-20 2003-03-14 Sagem METHOD FOR ORTHOGRAPHIC CORRECTION OF AN ALPHANUMERIC INPUT
JP4236641B2 (en) * 2003-01-20 2009-03-11 富士通株式会社 Authentication information processing method
JP4474213B2 (en) * 2003-06-25 2010-06-02 京セラミタ株式会社 Image processing apparatus and program
JP2005149388A (en) * 2003-11-19 2005-06-09 Sharp Corp Password authentication apparatus, program thereof, and recording medium
EP1857915B1 (en) 2005-02-22 2008-12-17 Research In Motion Limited Handheld electronic device having reduced keyboard and multiple password access, and associated methods
JP4332803B2 (en) * 2005-11-02 2009-09-16 コニカミノルタビジネステクノロジーズ株式会社 Information processing device
US20080066167A1 (en) * 2006-09-12 2008-03-13 Andri Michael J Password based access including error allowance
US20090210404A1 (en) * 2008-02-14 2009-08-20 Wilson Kelce S Database search control
JP5365120B2 (en) * 2008-09-25 2013-12-11 富士通株式会社 Information processing apparatus, information processing method, and program
JP2010114725A (en) * 2008-11-07 2010-05-20 Seiko Instruments Inc Evidence preservation apparatus, method of preserving evidence, and program
KR101248156B1 (en) * 2011-06-02 2013-03-27 서울대학교산학협력단 Method and apparatus for user authentication based on keystroke dynamics pattern data
US8209183B1 (en) 2011-07-07 2012-06-26 Google Inc. Systems and methods for correction of text from different input types, sources, and contexts
CN102981627B (en) * 2011-09-06 2015-04-08 腾讯科技(深圳)有限公司 Password inputting method and password inputting device
US9372602B2 (en) * 2012-11-04 2016-06-21 International Business Machines Corporation Password presentation management
US9305150B2 (en) * 2012-12-10 2016-04-05 Lookout, Inc. Method and system for managing user login behavior on an electronic device for enhanced security
JP6040780B2 (en) * 2013-01-15 2016-12-07 富士通株式会社 Cryptographic processing apparatus, method and program
CN103679448B (en) 2013-11-29 2017-02-22 天地融科技股份有限公司 Password inputting method and password inputting system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103455165A (en) * 2012-05-31 2013-12-18 捷讯研究有限公司 Touchscreen keyboard with corrective word prediction
CN103699233A (en) * 2013-12-20 2014-04-02 百度在线网络技术(北京)有限公司 Character string input method and device
CN104331668A (en) * 2014-09-28 2015-02-04 小米科技有限责任公司 Wrong password prompting method and device
CN104375665A (en) * 2014-12-09 2015-02-25 三星电子(中国)研发中心 Input-method error correction method and input-method error correction device

Also Published As

Publication number Publication date
US20180075010A1 (en) 2018-03-15
PL3306505T3 (en) 2020-10-19
ES2806629T3 (en) 2021-02-18
US10970482B2 (en) 2021-04-06
SG11201709536RA (en) 2017-12-28
EP3306505A4 (en) 2019-02-27
WO2016188297A1 (en) 2016-12-01
EP3306505A1 (en) 2018-04-11
KR102348769B1 (en) 2022-01-06
JP2018517211A (en) 2018-06-28
EP3306505B1 (en) 2020-06-03
KR20180014774A (en) 2018-02-09

Similar Documents

Publication Publication Date Title
US9525549B2 (en) Method and apparatus for securing a mobile application
US9286466B2 (en) Registration and authentication of computing devices using a digital skeleton key
US10298565B2 (en) Method and apparatus for user identity authentication
US11809540B2 (en) System and method for facilitating authentication via a short-range wireless token
US9160744B1 (en) Increasing entropy for password and key generation on a mobile device
TWI529641B (en) System for verifying data displayed dynamically by mobile and method thereof
JP5568696B1 (en) Password management system and program for password management system
WO2016188268A1 (en) Multi-user login method, device and storage medium
Munyendo et al. " The Same {PIN}, Just Longer": On the ({In) Security} of Upgrading {PINs} from 4 to 6 Digits
CN111125456A (en) Virtual password comparison method and system and intelligent lock
CN106295266A (en) Data inputting method and device
CN109858914A (en) Block chain data verification method, device, computer equipment and readable storage medium storing program for executing
US20130090059A1 (en) Identity verification
CN105787318B (en) Access method, access mechanism and the mobile terminal of user domain
CN104717064A (en) Password peep-prevention method and user terminal
KR101473576B1 (en) Method for Offline Login based on SW Token and Mobile Device using the same
US20130311770A1 (en) Tracing device and method
CN114117388A (en) Device registration method, device registration apparatus, electronic device, and storage medium
CN105162767B (en) Authentication method and system based on fingerprint
CN111125726A (en) Initialization method and device of display equipment
KR20140090012A (en) Variable password generation method and internet authentication system using the same
JP2015170352A (en) Password management system
KR20140070709A (en) User Authentication Method Using Input Rhythm and Apparatus thereof
Geng et al. Improved Digital Password Authentication Method for Android System
JP2007072562A (en) Authentication processor

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170104